SlideShare a Scribd company logo
Criticality of Identity
    The Importance of Knowing Who
         Your API Consumer Is

              Hans Zandbelt
          CTO Office - Ping Identity



1                             Copyright ©2012 Ping Identity Corporation. All rights reserved.
Overview


                                                        1
      Cloud & APIs: The Trends
         - History, state-of-the-art, trends,

                                                                  2
                           Identity and APIs
                              - What, why, how

                                                      3
                                     Recommendations
                                       - API strategy



2                                        Copyright ©2012 Ping Identity Corporation. All rights reserved.
[section lead-in]

    CLOUD & APIS: THE TRENDS




3                       Copyright ©2012 Ping Identity Corporation. All rights reserved.
Cloud 1.0




                       FIREWALL
                SaaS                                                 database
                                         APP

      SaaS
                                                                     APP




        SaaS

                                                                                      directory




4                                 Copyright ©2012 Ping Identity Corporation. All rights reserved.
Cloud Moves: 3 Dimensions of Change

                                                 • Users
                                                        – Workforce
                                                        – Customers/cons
                                                          umers
           Users                                        – Partners
                                                 • Devices
                                                        – Mobile/fixed
                      Devices                           – Browser/app
                                                        – BYOD/E-owned
                                                 • Location
                                                        – Services
                                                        – Users
    Location(s)
5                                   Copyright ©2012 Ping Identity Corporation. All rights reserved.
How it should be: Cloud 2.0




    database
                SaaS     firewall                                            database

                                                 APP
      SaaS



                                                                                      directory
         SaaS                                              APP




6                                   Copyright ©2012 Ping Identity Corporation. All rights reserved.
Consequences


                       FIREWALL




      Traditional firewall and enterprise domain-based
      security cannot deal with Cloud Apps and Mobile
                   devices and applications.
           IDENTITY IS THE NEW PERIMETER

7                                    Copyright ©2012 Ping Identity Corporation. All rights reserved.
IDENTITY & APIS




8                     Copyright ©2012 Ping Identity Corporation. All rights reserved.
The Internet Scale Identity Concept

                                                       • Identity Provider
                                                              – Authoritative
                                                              – Scale
                                                              – Manageability
                    verify
                                                       • UNIFORM across
                                                         Web SSO & API
                                                         Access
                                                       • Security AND
                                                         Convenience
                                                       • How to extend
                                                         enterprise security
                                                         policies to the cloud:
                                                         a MUST have




9                                         Copyright ©2012 Ping Identity Corporation. All rights reserved.
Playfield




                 User Provisioning


       Web SSO                                   API Access




10                             Copyright ©2012 Ping Identity Corporation. All rights reserved.
The API Economy Drivers

                                        • SaaS
                                               – API access to
                                                 data/services vs.
                                                 browser access
                                               – Cloud, Mobile/Big
                                                 Data, BYOD
                                               – Salesforce.com >
                                                 60%
                                        • APIs of PaaS
                                          offerings
                                               – Expose own cloud
                                                 services
                                        • Clear trend for APIs
                                          towards REST



11                         Copyright ©2012 Ping Identity Corporation. All rights reserved.
API Access

                                             • HTTP
                                             • SOAP
              SERVICE                               – WS-Security/WS-
                                                      Trust
                                             • REST
                                                    –?

          SOAP / REST
                                             • TOKEN
                                                    – Obtain
                                                    – Use
                        Token
                                                    – Validate


                                             • Passwords??
              CLIENT


12                              Copyright ©2012 Ping Identity Corporation. All rights reserved.
Password anti-pattern

                                      • 3rd party client
                                        store user
                                        passwords
                                      • Teaches users to
                                        be indiscriminate
                                        with passwords
                                      • No multi-factor or
                                        federated
                                        authentication
                                      • No granularity
                                      • No differentiation
                                      • No revocation



13                       Copyright ©2012 Ping Identity Corporation. All rights reserved.
Drivers


                  Lack        Password
                   Of           Anti
               Standards       Pattern




                Native              REST
                Mobile              Cloud
                Apps                APIs


14                         Copyright ©2012 Ping Identity Corporation. All rights reserved.
OAuth 2.0

                          • Secure API
                            authorization
                                 – simple & standard
                                 – desktop, mobile web
                          • Auth & Authz for
                            RESTful APIs
                          • Delegated
                            authorization
                                 – mitigates password
                                   anti-pattern
                          • Issue tokens for
                            granular access
                                 – Without divulging
                                   your credentials




15           Copyright ©2012 Ping Identity Corporation. All rights reserved.
OAuth 2.0 Benefits

                                            • Security & Usability
                                            • Revocation
                                            • Granularity
                                            • Use Cases*
                      Scopes

                                            • Passwords vs.
                                              Oauth == creditcard
                                              vs. checks




16                             Copyright ©2012 Ping Identity Corporation. All rights reserved.
SSO for Mobile Apps: Authorization Agent (AZA)

                                             • Aggregate OAuth
                                               flows and logins
                                             • Bootstrap through
                                               WebSSO with
                                               OpenID Connect or
     OAUTH           SSO
                                               SAML
                                             • Oauth-as-a-Service
                                               + SAML-as-a-
                                               Service




17                              Copyright ©2012 Ping Identity Corporation. All rights reserved.
[section lead-in]

     RECOMMENDATIONS




18                       Copyright ©2012 Ping Identity Corporation. All rights reserved.
Something to think about: cloud IAM strategy

                                                 • Multi-use case,
                                                   multi-device, multi-
                                                   channel, multi
                                                   protocol…
                                                        – Identity is the
                                                          connector
                                                 • Interoperability and
                                                   standards
                                                 • IAM not just an
                                                   internal technical
                                                   issue: also a
                                                   strategic business
                                                   enabler
                                                 • Architect for agility



19                                  Copyright ©2012 Ping Identity Corporation. All rights reserved.
Identity for APIs strategy


     • Implement your API for:
       – externalized authentication and authorization
       – tokens instead of passwords
       – consumer identity AND enterprise identity
     • By leveraging identity we can:
       – address API access (server2server, mobile) in the
         same way as Web SSO
       – reuse existing security and identity policies
       – connect your existing identity store
     • Possibly implement this in a single system(!)

20                                     Copyright ©2012 Ping Identity Corporation. All rights reserved.
Expect More Change

                                   • Continued trend to
                                     SaaS, PaaS, IDaaS,
                                     leveraging APIs


                                   • Continued evolution
                                     and adoption of
                                     open standards
                                     such as OAuth 2.0
                                     and OpenID
                                     Connect; 2013 is the
                                     year of Identity
                                     Standards




21                    Copyright ©2012 Ping Identity Corporation. All rights reserved.
COME AND SEE US!


     Hans Zandbelt
     Twitter: @hanszandbelt
     www.pingidentity.com




22                            Copyright ©2012 Ping Identity Corporation. All rights reserved.

More Related Content

PDF
The “I” in API is for Identity (Nordic APIS April 2014)
PDF
Integrated social solutions, the power and pitfalls of mashups
PDF
Who’s Knocking? Identity for APIs, Web and Mobile
PDF
Interoperability in a B2B Word (NordicAPIS April 2014)
PDF
Launching a Successful and Secure API
PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
PPTX
The Business Value for Internal APIs in the Enterprise
PDF
Importance of APIs in the Internet of Things
The “I” in API is for Identity (Nordic APIS April 2014)
Integrated social solutions, the power and pitfalls of mashups
Who’s Knocking? Identity for APIs, Web and Mobile
Interoperability in a B2B Word (NordicAPIS April 2014)
Launching a Successful and Secure API
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
The Business Value for Internal APIs in the Enterprise
Importance of APIs in the Internet of Things

What's hot (20)

PDF
Secure your APIs using OAuth 2 and OpenID Connect
PDF
Open APIs - Risks and Rewards (Øredev 2013)
PPTX
Con8817 api management - enable your infrastructure for secure mobile and c...
PPTX
Enterprise API Adoption Patterns
PDF
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
PPTX
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
PDF
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
PPTX
Platform for Secure Digital Business
PPTX
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
PPTX
Powering Internal API Communities
PDF
OAuth in the Real World featuring Webshell
PDF
Enabling the Multi-Device Universe
PDF
5 Steps for End-to-End Mobile Security with Consumer Apps
PDF
APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
PPTX
Bigger, Better Business With OAuth
PDF
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
PDF
Single Sign-On for Mobile
PPTX
Catalyst 2015: Patrick Harding
PDF
Enable Secure Mobile & Web Access to Microsoft SharePoint
PDF
Who Cares About APIs? (NordicAPIS April 2014)
Secure your APIs using OAuth 2 and OpenID Connect
Open APIs - Risks and Rewards (Øredev 2013)
Con8817 api management - enable your infrastructure for secure mobile and c...
Enterprise API Adoption Patterns
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Platform for Secure Digital Business
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Powering Internal API Communities
OAuth in the Real World featuring Webshell
Enabling the Multi-Device Universe
5 Steps for End-to-End Mobile Security with Consumer Apps
APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
Bigger, Better Business With OAuth
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Single Sign-On for Mobile
Catalyst 2015: Patrick Harding
Enable Secure Mobile & Web Access to Microsoft SharePoint
Who Cares About APIs? (NordicAPIS April 2014)
Ad

Viewers also liked (7)

PDF
State of APIs: Now & Next
PDF
Samtrafiken - Lessons learned from Trafiklab
PPTX
Sveriges radio nordic apis 21 mars 2013
PDF
Nordic APIs - Integrated Social Solutions for a Cloudy, Mobile World
PPTX
Applying a Developer-Centric Approach to API Design from API Architect Ronnie...
PDF
Microservice Websites (microXchg 2017)
PDF
Nordic APIs - Building a Secure API
State of APIs: Now & Next
Samtrafiken - Lessons learned from Trafiklab
Sveriges radio nordic apis 21 mars 2013
Nordic APIs - Integrated Social Solutions for a Cloudy, Mobile World
Applying a Developer-Centric Approach to API Design from API Architect Ronnie...
Microservice Websites (microXchg 2017)
Nordic APIs - Building a Secure API
Ad

Similar to Criticality of identity (20)

PDF
Gartner Catalyst Savvis Cloud API Case Study
PPTX
When where why cloud
PPTX
When where why cloud
PPTX
When Where Why Cloud
PDF
Cloudcamp Barcelona 2009 Lightning Talk - 3scale
PDF
An enterprise journey in the Cloud
PDF
Cloud Computing - Jan 2011 - Chandna
PDF
Identity in an API Economy KuppingerCole Webinar Sponsored by Layer 7
PPTX
Introduction to cloud computing
PPTX
Monetizing the Enterprise: Borderless Networks
PDF
Re Inventing Enterprise IT around APIs and Apps
PDF
VMware Zimbra vs. Novell Groupwise
PPTX
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
PDF
Translating Open Source Value to the Cloud
PDF
OpenStack: Time is Now - Lew Tucker
PDF
OpenStack- The Time is Now - Lew Tucker, Cisco
PDF
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
PPTX
Building and packaging highly scalable services for maximum market penetratio...
PDF
Eo navigating the cloud v8
PDF
Eo navigating the cloud
Gartner Catalyst Savvis Cloud API Case Study
When where why cloud
When where why cloud
When Where Why Cloud
Cloudcamp Barcelona 2009 Lightning Talk - 3scale
An enterprise journey in the Cloud
Cloud Computing - Jan 2011 - Chandna
Identity in an API Economy KuppingerCole Webinar Sponsored by Layer 7
Introduction to cloud computing
Monetizing the Enterprise: Borderless Networks
Re Inventing Enterprise IT around APIs and Apps
VMware Zimbra vs. Novell Groupwise
considering the cloud? From IaaS to SaaS and Beyond - Find Your Path to the C...
Translating Open Source Value to the Cloud
OpenStack: Time is Now - Lew Tucker
OpenStack- The Time is Now - Lew Tucker, Cisco
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Building and packaging highly scalable services for maximum market penetratio...
Eo navigating the cloud v8
Eo navigating the cloud

More from Nordic APIs (20)

PPTX
How to Choose the Right API Platform - We Have the Tool You Need! - Mikkel Iv...
PPTX
Bulletproof Backend Architecture: Building Adaptive Services with Self-Descri...
PDF
Implementing Zero Trust Security in API Gateway with Cilium - Pubudu Gunatila...
PPTX
Event-Driven Architecture the Cloud-Native Way - Manuel Ottlik, HDI Global SE
PPTX
Navigating the Post-OpenAPI Era with Innovative API Design Frameworks - Danie...
PDF
Using Typespec for Open Finance Standards - Chris Wood, Ozone API
PPTX
Schema-first API Design Using Typespec - Cailin Smith, Microsoft
PPTX
Avoiding APIpocalypse; API Resiliency Testing FTW! - Naresh Jain, Xnsio
PPTX
How to Build an Integration Platform with Open Source - Magnus Hedner, Benify
PPTX
API Design First in Practise – An Experience Report - Hari Krishnan, Specmatic
PPTX
The Right Kind of API – How To Choose Appropriate API Protocols and Data Form...
PPTX
Why Frequent API Hackathons Are Key to Product Market Feedback and Go-to-Mark...
PPTX
Maximizing API Management Efficiency: The Power of Shifting Down with APIOps ...
PPTX
APIs Vs Events - Bala Bairapaka, Sandvik AB
PPTX
GraphQL in the Post-Hype Era - Daniel Hervas, Reckon Digital
PPTX
From Good API Design to Secure Design - Axel Grosse, 42Crunch
PPTX
API Revolution in IoT: How Platform Engineering Streamlines API Development -...
PPTX
Unlocking the ROI of API Platforms: What Success Actually Looks Like - Budhad...
PDF
Increase Your Productivity with No-Code GraphQL Mocking - Hugo Guerrero, Red Hat
PPTX
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Theodo ...
How to Choose the Right API Platform - We Have the Tool You Need! - Mikkel Iv...
Bulletproof Backend Architecture: Building Adaptive Services with Self-Descri...
Implementing Zero Trust Security in API Gateway with Cilium - Pubudu Gunatila...
Event-Driven Architecture the Cloud-Native Way - Manuel Ottlik, HDI Global SE
Navigating the Post-OpenAPI Era with Innovative API Design Frameworks - Danie...
Using Typespec for Open Finance Standards - Chris Wood, Ozone API
Schema-first API Design Using Typespec - Cailin Smith, Microsoft
Avoiding APIpocalypse; API Resiliency Testing FTW! - Naresh Jain, Xnsio
How to Build an Integration Platform with Open Source - Magnus Hedner, Benify
API Design First in Practise – An Experience Report - Hari Krishnan, Specmatic
The Right Kind of API – How To Choose Appropriate API Protocols and Data Form...
Why Frequent API Hackathons Are Key to Product Market Feedback and Go-to-Mark...
Maximizing API Management Efficiency: The Power of Shifting Down with APIOps ...
APIs Vs Events - Bala Bairapaka, Sandvik AB
GraphQL in the Post-Hype Era - Daniel Hervas, Reckon Digital
From Good API Design to Secure Design - Axel Grosse, 42Crunch
API Revolution in IoT: How Platform Engineering Streamlines API Development -...
Unlocking the ROI of API Platforms: What Success Actually Looks Like - Budhad...
Increase Your Productivity with No-Code GraphQL Mocking - Hugo Guerrero, Red Hat
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Theodo ...

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Empathic Computing: Creating Shared Understanding
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Modernizing your data center with Dell and AMD
Empathic Computing: Creating Shared Understanding
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm

Criticality of identity

  • 1. Criticality of Identity The Importance of Knowing Who Your API Consumer Is Hans Zandbelt CTO Office - Ping Identity 1 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 2. Overview 1 Cloud & APIs: The Trends - History, state-of-the-art, trends, 2 Identity and APIs - What, why, how 3 Recommendations - API strategy 2 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 3. [section lead-in] CLOUD & APIS: THE TRENDS 3 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 4. Cloud 1.0 FIREWALL SaaS database APP SaaS APP SaaS directory 4 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 5. Cloud Moves: 3 Dimensions of Change • Users – Workforce – Customers/cons umers Users – Partners • Devices – Mobile/fixed Devices – Browser/app – BYOD/E-owned • Location – Services – Users Location(s) 5 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 6. How it should be: Cloud 2.0 database SaaS firewall database APP SaaS directory SaaS APP 6 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 7. Consequences FIREWALL Traditional firewall and enterprise domain-based security cannot deal with Cloud Apps and Mobile devices and applications. IDENTITY IS THE NEW PERIMETER 7 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 8. IDENTITY & APIS 8 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 9. The Internet Scale Identity Concept • Identity Provider – Authoritative – Scale – Manageability verify • UNIFORM across Web SSO & API Access • Security AND Convenience • How to extend enterprise security policies to the cloud: a MUST have 9 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 10. Playfield User Provisioning Web SSO API Access 10 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 11. The API Economy Drivers • SaaS – API access to data/services vs. browser access – Cloud, Mobile/Big Data, BYOD – Salesforce.com > 60% • APIs of PaaS offerings – Expose own cloud services • Clear trend for APIs towards REST 11 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 12. API Access • HTTP • SOAP SERVICE – WS-Security/WS- Trust • REST –? SOAP / REST • TOKEN – Obtain – Use Token – Validate • Passwords?? CLIENT 12 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 13. Password anti-pattern • 3rd party client store user passwords • Teaches users to be indiscriminate with passwords • No multi-factor or federated authentication • No granularity • No differentiation • No revocation 13 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 14. Drivers Lack Password Of Anti Standards Pattern Native REST Mobile Cloud Apps APIs 14 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 15. OAuth 2.0 • Secure API authorization – simple & standard – desktop, mobile web • Auth & Authz for RESTful APIs • Delegated authorization – mitigates password anti-pattern • Issue tokens for granular access – Without divulging your credentials 15 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 16. OAuth 2.0 Benefits • Security & Usability • Revocation • Granularity • Use Cases* Scopes • Passwords vs. Oauth == creditcard vs. checks 16 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 17. SSO for Mobile Apps: Authorization Agent (AZA) • Aggregate OAuth flows and logins • Bootstrap through WebSSO with OpenID Connect or OAUTH SSO SAML • Oauth-as-a-Service + SAML-as-a- Service 17 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 18. [section lead-in] RECOMMENDATIONS 18 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 19. Something to think about: cloud IAM strategy • Multi-use case, multi-device, multi- channel, multi protocol… – Identity is the connector • Interoperability and standards • IAM not just an internal technical issue: also a strategic business enabler • Architect for agility 19 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 20. Identity for APIs strategy • Implement your API for: – externalized authentication and authorization – tokens instead of passwords – consumer identity AND enterprise identity • By leveraging identity we can: – address API access (server2server, mobile) in the same way as Web SSO – reuse existing security and identity policies – connect your existing identity store • Possibly implement this in a single system(!) 20 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 21. Expect More Change • Continued trend to SaaS, PaaS, IDaaS, leveraging APIs • Continued evolution and adoption of open standards such as OAuth 2.0 and OpenID Connect; 2013 is the year of Identity Standards 21 Copyright ©2012 Ping Identity Corporation. All rights reserved.
  • 22. COME AND SEE US! Hans Zandbelt Twitter: @hanszandbelt www.pingidentity.com 22 Copyright ©2012 Ping Identity Corporation. All rights reserved.

Editor's Notes

  • #5: Today: a mix of on-premise applications and SaaS or cloud applications, both web and mobile native apps.User authentication and access control based on app-specific accounts and credentials, some SSO to web apps, mostly internal.Firewall applies to some applications, hosted on the corporate network.
  • #6: The expansion of cloud usage brings along 3 dimensions of change:Users: different use cases, more and more inbound too. Consumer identity: 70% dropoff on registration.Devices: mobile, smaller screens, different capabilities, no longer exclusively owned by the enterprise.
  • #7: Applications reside both on-premises and in the cloud, but also directories and databases.Users can access these applications from anywhere, using a variety of devices.User accounts and Access control demand to be harmonized over cloud and on-premises for compliancy reasons, following the corporate IT security policy.The firewall can no longer be the center of the universe: access control needs to be handled on a different level.
  • #8: It is clear that a corporate firewall cannot meet the demands for cloud, mobile and hybrid use cases.Identity is the concept that is shared between all contexts, what binds everything together in IAM.We must concludethat identity is the new perimeter, or at least the new paradigm to leverage.
  • #9: What is the role that identity can play for APIs.
  • #10: Separate identity information from the application. Leverage the remote identity through the client accessing the application.Identity on internet scale leverages a 2rd or 3rd party that is well positioned to manage and publish identity information (concept holds for both enterprise and consumer scenario’s).We should strive to use identity across the web world (browser-based apps, Web SSO) and the native world (mobile and rich desktop clients): no need to do things twiceSSO is about convience for users, but more importantly: addressing a bunch of security issues. SSO using 3rd party asserted identity actually is a rare exampleWhere convenience and security go hand in hand.Applying this concept in a uniform way will allow enterprise businesses to extend their enterprise security policies to the cloud.That is a must have for compliancy reasons.
  • #12: APIs are becoming important rapidly especially because of the rise of mobile apps and big data.
  • #13: How would you secure web apis:SOAP: WS-SecurityREST: nothing there yet until recently. Only passwords.What we need is a token based method to access APIs: will explain in the next slide.
  • #14: Deprecated way of dealing with API access: hand out your password to a client or third party service.Bad: store pwd, indiscriminate, no multi-factor, no granularity, no differentation, no revocation.Need something better.
  • #16: Enter Oauth 2.0: a protocol for secure API authorization.Simple standard or framework, based on REST and JSON, meant for the mobile web world.Delegated authorization, tokens are issued, obtained and used to mitigate the anti-password pattern.Granular, revokable access to specified parties, without exposing your credentials.
  • #17: Framework, allows for a variety of use cases over enterprise and consumer domains.Balance between security and usablilty by using 2 types of tokens: access tokens and refresh tokens.Scopes: allow for fine grained granularity, of access control, much like entitlements.
  • #18: Recent development: leverageOauth to achieve SSO across native apps.Until now each app would do its own Oauth flow which may result in a user logging in and granting access to an app on an individual basis, repeatably.This shows how to leverage an existing Web SSO investment, eg. SAML or OpenID Connect for native mobile app SSO.
  • #20: In the new cloud world we need to be prepared with a variety of use cases, devices, channels and hence protocols.Identity however is a constant factor and really the constant connector between all. Interoperability and standards are important: cloud is about doing things across multi-domains: interoperability only comes with standards. Choose products that implement standards, if possibleMany standards at once!IAM as a business enabler: it can streamline the way in which you’re doing business, adding convenience and security for all parties you deal with (employees, customers, partners)Across devices preferred by your partners/users.Agility: cloud IT is meant to cope with ever changing demands, static infrastructure is legacy, have more flexibility, rapid changing IT environment; architect your IT for that
  • #21: Externalization of authentication and authorization: make your API use tokens, not passwords. Some of your APIs may eventually have to deal with both enterprise as well as consumer identity. Be sure that you can handle that.Design your API so that you can handle both the browser based, the server2server communication as well as native mobile applications inA unified way.Reuse your existing security and identity policies across the 3 worlds and use your existing identity store to do that. No need to build custom silosFor doing this.And best of all: you don’t need to implement that, you can use an existing server or implementation. Come and talk to Ping!
  • #22: Cloud will expand and change.2013 is the year of the Identity standards, OpenID Connect (ratitication) and OAuth 2.0 (large deployments and convergence)Ping will be at the forefront of these changes, actively developing and implementing the new standards.